Posets and protocols - picking the right three-party protocol. / Ng, Siaw-Lynn.

In: IEEE Journal on Selected Areas in Communications, Vol. 21, No. 1, 2003, p. 55-61.

Research output: Contribution to journalArticle

Published

Documents

Links

Abstract

In this paper we introduce a framework in which we can investigate the
possibility of adapting a security protocol in order to obtain optimal
efficiency according to the communication channels available. This
method is based on the observation that there is a partial order
imposed upon the actions of the various parties involved in a
protocol. We define operations permitted on the partially ordered set
associated with the protocol and obtain transformations of the
original protocol while preserving the security properties.
Performing these operations on the protocol we enumerate the options
available to a system.
Original languageEnglish
Pages (from-to)55-61
Number of pages6
JournalIEEE Journal on Selected Areas in Communications
Volume21
Issue number1
DOIs
Publication statusPublished - 2003
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 1328679